Comment Don't think it's illegal... (Score 1) 751
Do you mean that the hospital can't use CT- or CAT-scan on a child either? I don't believe that is forbidden, nor do I think that the full body scanner violates that law.
Do you mean that the hospital can't use CT- or CAT-scan on a child either? I don't believe that is forbidden, nor do I think that the full body scanner violates that law.
What is a security expert? Is it people who believe that they are experts in one single area, and that area is called security?
I work with IT security for a living, and there are many areas within that field. We have people who are good at network and data analysis, some who can reverse engineer malware, others who do a good forensics job, one group focuses on incident response and others works with standards and procedures. And this is just a few areas. Encryption is a part of this. Tempest too.
So again, what is a security expert? One who is an expert in one or all of this areas? What is DHS looking for?
It is a much better practice to use a "walled garden"[1] to give them a very limited access to the net until they have cleaned up their infection. I have seen examples of this used to give the customers access to anti-virus software and Windows update only, in addition to a set of web pages that explains why they have limited access (and how to get out of it).
This is a much better solution than just blocking the customers access to the net.
Seems like the games included in the emulator, was cracked versions from a group called "Remember". Found a blog with some screenshots of it at this blog.
...and then type:
LOAD "*",8,1
RUN
And you will see that the game has a cracker intro (from a group called REMEMBER)... with greetings to many of the good old cracker groups on the Commodore 64.
"You'll love our fun-filled resort on beautiful Guantanamo Bay!"
You summed this up nicely. There is one more thing to add about using electron force microscopy: It takes a huge amount of time. And it is not as accurate as most people seems to think since it is based on the disks inaccuracy on where the bits are written.
How you delete your drive data depends a lot on what level of security you need. One overwrite is enough for most people. Degaussing and/or physical destruction is only needed as a prevention against theoretical recovery techniques.
The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.